Security Engineer, Governance, Risk and Compliance Create the future of travel with us Whether it's to visit the people closest to us, starting an exciting adventure, or a career-defining business trip, travel is an essential part of our lives. Yet we've all experienced the aches and pains of getting to our destination. Today, more than … is growing, and we're looking for talented people to join us on our journey. Foundations at Duffel The Foundations team is responsible for the reliability, performance, resilience and security of our infrastructure and applications. The team is working closely with our various engineering teams to understand their needs and help meet the demands of our platform as we … scale globally. What you'll do As a Security Engineer on our Foundations team, you will play a crucial role in establishing and maintaining a robust security governance framework. Your work will be instrumental in ensuring the organisation's compliance with industry standards and regulations, safeguarding our data and systems and building trust with key partners. You will More ❯
reports. Reviews and evaluates system performance against cybersecurity related specification requirements, monitors and assesses field performance, and assesses risk of meeting user and specification requirements. Prepares and evaluates cybersecurity security strategies for requested programs. Extensive experience in operational Cyber Security accreditation and certification of embedded systems accredited at Secret level and below. Extensive understanding of AR … and the DoD Risk Management Framework (RMF) to include actually current experience (less than 2 years old) in obtaining system accreditation using the DoD RMF and the Enterprise Mission Assurance Support Service (eMASS) software. Extensive experience preparing recommended IA approval and supporting information documentation and understand systems engineering processes and possesses extensive experience in Network Security Architect experience. … Extensive understanding of the DoD standards guiding the development of cybersecurity policy, requirements, integration, engineering, and certification and accreditation. Perform security, analyses and risk/vulnerability assessments. Execute day to day certification and accreditation activities for a project team. Level III: Possesses and applies a comprehensive knowledge across key tasks and high impact assignments and plans and leads major More ❯
Leonardo UK is seeking a proven, experienced Principal Consultant to join the Cyber & Security Solutions Division team. This role is focused on supporting the delivery of security aspects to the company's core products and to external stakeholders. This requires co-ordination with engineering teams and delivery of all facets of cyber and information security related to … and with our customers. Talk to us to find out more. Key Responsibility Areas Leading a team or operating independently to meet all aspects of the cyber and information security delivery across an engineering lifecycle. Interpreting customer requirements into actionable securitymanagement plans, statements of work, and activities to be delivered across the lifecycle. Become the lead … security subject matter expert for the product being delivered. Oversight and delivery of associated statements of work and artefacts to time, cost and quality constraints. Identification, management and escalation of technical and delivery risks and issues. Management of the customer relationships for the cyber and information security workstream, both internal and external. Line management and More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Lockheed Martin
ongoing operations, maintenance and continuous improvement of multiple classified IT program environments. This IT professional will ensure that the Space IT systems are managed, controlled and compliant with the Security Technical Implementation Guide (STIG) and the Risk Management Framework (RMF). If you are looking for a hands-on role with the flexibility to learn and apply a … call rotation, and occasional weekend activities. What's In It For You: From onsite to remote, we offer flexible work schedules to comprehensive benefits investing in your future and security, Learn more about Lockheed Martin's comprehensive benefits package here. Lockheed Martin provides the resources and the flexibility to enable inspiration and focus! If you have the passion and … within 6 months of starting the position • Experience with Linux/UNIX Server and Desktop Operating Systems (i.e. RH 7.x, RH 8.x, etc.) • Experience with Operating Systems life cycle management and configuration management (i.e., Installation/Upgrades, System Imaging, Account Management, Print Services, Domain Services, Hardware Modernization, Performance Monitoring, etc.) • Experience supporting daily incident response (i.e., Helpdesk More ❯
Easter Howgate, Midlothian, United Kingdom Hybrid / WFH Options
Leonardo UK Ltd
Job Description: Job Description Leonardo UK is seeking a proven, experienced Principal Consultant to join the Cyber & Security Solutions Division team. This role is focused on supporting the delivery of security aspects to the company's core products and to external stakeholders. This requires co-ordination with engineering teams and delivery of all facets of cyber and information … security related to the delivery across the engineering lifecycle - from requirements all the way through to in-service support and maintenance. This is an exciting opportunity to be part of significant programmes, during which you will ensure that products meet the highest standards, in accordance with customer's requirements and risk appetite. You will be supported in this role … and with our customers. Talk to us to find out more. Key Responsibility Areas Leading a team or operating independently to meet all aspects of the cyber and information security delivery across an engineering lifecycle. Interpreting customer requirements into actionable securitymanagement plans, statements of work, and activities to be delivered across the lifecycle. Become the lead More ❯
Principal Security Consultant page is loaded Principal Security Consultant Apply locations GB - Edinburgh GB - Newcastle time type Full time posted on Posted 24 Days Ago job requisition id R Job Description: Job Description Leonardo UK is seeking a proven, experienced Principal Consultant to join the Cyber & Security Solutions Division team. This role is focused on supporting the … delivery of security aspects to the company's core products and to external stakeholders. This requires co-ordination with engineering teams and delivery of all facets of cyber and information security related to the delivery across the engineering lifecycle - from requirements all the way through to in-service support and maintenance. This is an exciting opportunity to be … and with our customers. Talk to us to find out more. Key Responsibility Areas Leading a team or operating independently to meet all aspects of the cyber and information security delivery across an engineering lifecycle. Interpreting customer requirements into actionable securitymanagement plans, statements of work, and activities to be delivered across the lifecycle. Become the lead More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Tunstall Healthcare (UK) Ltd
We are currently recruiting for a Regional Information Security Officer , reporting to the Global Chief Information Security Officer (CISO), to oversee the information security function across the countries and Tunstall entities in their scope. This is an incredibly exciting time to join Tunstall as we embark on an exciting period of transformation. You will be joining a … recently created and growing global Information Security team within Tunstall and will be in a leadership position playing a key part in the success of this transformation. This role would be based at either our Manchester office or our Whitley site (DN14 0HR) working on a hybrid basis. We are flexible on number of days in the office. What … will you be doing in this role? As our Regional Security Officer , you will be responsible for implementing, running and overseeing the information security function across the countries and Tunstall entities in your scope, ensuring consistent and strong information securitymanagement in support of our business goals and in line with the global Information SecurityMore ❯
and Communications (NC3) programs. Active Top-Secret Clearance or Top-Secret Clearance, eligibility is required. You will leverage your knowledge in systems engineering, Model-Based Systems Engineering (MBSE), and security engineering to support a range of initiatives, including modernization and lifecycle management of PMW 770 programs. This position also involves collaboration with key stakeholders and partner organizations, such … including networking and transport issues. Document risks, issues, and opportunities; develop mitigation strategies and contingency plans; and track their resolution through completion. Document and manage system baseline and change management processes. Ensure alignment of baseline changes, Engineering Change Requests (ECRs), Ship Specification Change Requests, and Temporary Alterations (TEMPALTs) with the Model-Based Systems Engineering (MBSE) baseline. Review these changes … documentation for milestone decisions, System Engineering Technical Reviews (SETR), assessments, and evaluations. Generate accurate documentation derived from MBSE models, ensure consistency with model data, and recommend corrections as necessary. SECURITY AND PRIVACY DUTIES AND RESPONSIBILITIES Individuals working for DSS will be subject to security and privacy requirements as explained in HIPAA, FedRAMP, and NIST 800-53. Additionally More ❯
program to increase awareness among internal and external audiences of the organization's capabilities and services. Coordinate with executive administrative support and international cooperation staff to ensure logistical readiness, security clearances, and seamless communication for senior leadership engagements both domestically and internationally. Advise on the prioritization and acceptance of speaking engagements and events, collaborating with Public Affairs, General Counsel … is one of America's fastest-growing companies, being named to the Inc. 5000 List in 2014/2015/2016/2017. With an ISO 9001 certified quality management system, an ISO 27001 certified information securitymanagement system, an ISO 20000-1 ITSM system, and delivery processes assessed at CMMI SVC Level 3, Xcelerate is committed More ❯
hardware work seamlessly across the organisation, enabling the teams to perform their roles with maximum efficiency. The ideal candidate will have a strong background in cloud technologies, mobile device management, and network infrastructure. Role Overview: As the IT Support Administrator, you will be responsible for the management and support of the cloud-based systems. You will ensure all … IT systems, applications, networks, and hardware are running optimally, providing excellent support and training to users. Youll also collaborate with the Head of IT to continually improve processes, security, and efficiency across the IT environment. Key Responsibilities: · Microsoft 365 Administration (Cloud-Based) · Entra ID Management · Mobile Device Management (MDM) · Network Infrastructure Management (Cambium) · Issue Resolution · Helpdesk … Management · Desk-Side & Remote Support · Documentation & Reporting · Security & Compliance · Training & Development · Hardware Deployment & Integration · Supplier & Vendor Liaison · Continuous Improvement Skills and Qualifications: · Strong experience in managing Microsoft 365 (in a cloud-based environment, · Proficiency in Entra (formerly Azure Active Directory) for identity and access management, including MFA, conditional access, and user lifecycle management. · Hands-on experience in More ❯
hardware work seamlessly across the organisation, enabling the teams to perform their roles with maximum efficiency. The ideal candidate will have a strong background in cloud technologies, mobile device management, and network infrastructure. Role Overview: As the IT Support Administrator, you will be responsible for the management and support of the cloud-based systems. You will ensure all … IT systems, applications, networks, and hardware are running optimally, providing excellent support and training to users. Youll also collaborate with the Head of IT to continually improve processes, security, and efficiency across the IT environment. Key Responsibilities: Microsoft 365 Administration (Cloud-Based) Entra ID Management Mobile Device Management (MDM) Network Infrastructure Management (Cambium) Issue Resolution Helpdesk … Management Desk-Side & Remote Support Documentation & Reporting Security & Compliance Training & Development Hardware Deployment & Integration Supplier & Vendor Liaison Continuous Improvement Skills and Qualifications: Strong experience in managing Microsoft 365 (in a cloud-based environment, Proficiency in Entra (formerly Azure Active Directory) for identity and access management, including MFA, conditional access, and user lifecycle management. Hands-on experience in More ❯
St Neots, Saint Neots, Cambridgeshire, United Kingdom
Interaction Recruitment
hardware work seamlessly across the organisation, enabling the teams to perform their roles with maximum efficiency. The ideal candidate will have a strong background in cloud technologies, mobile device management, and network infrastructure. Role Overview: As the IT Support Administrator, you will be responsible for the management and support of the cloud-based systems. You will ensure all … IT systems, applications, networks, and hardware are running optimally, providing excellent support and training to users. Youll also collaborate with the Head of IT to continually improve processes, security, and efficiency across the IT environment. Key Responsibilities: · Microsoft 365 Administration (Cloud-Based) · Entra ID Management · Mobile Device Management (MDM) · Network Infrastructure Management (Cambium) · Issue Resolution · Helpdesk … Management · Desk-Side & Remote Support · Documentation & Reporting · Security & Compliance · Training & Development · Hardware Deployment & Integration · Supplier & Vendor Liaison · Continuous Improvement Skills and Qualifications: · Strong experience in managing Microsoft 365 (in a cloud-based environment, · Proficiency in Entra (formerly Azure Active Directory) for identity and access management, including MFA, conditional access, and user lifecycle management. · Hands-on experience in More ❯
UCL research activities. Research Data Stewards (also known as research data managers, data consultants, data wranglers, or bioinformaticians) offer technical support and consultancy to UCL researchers, assisting with data management, policy compliance, and promoting Open Science and FAIR data principles. They will be embedded within research projects but also contribute to new research proposals and collaborate on designing research … are essential to clearly explain technical concepts to non-technical staff. At the Senior grade, candidates should have a strong background working with sensitive data, understanding data governance, information security, and risk management, and be familiar with issues related to handling and disseminating sensitive data. We are especially interested in applicants with experience in areas such as ISO27001 … certification, Information SecurityManagement Systems (ISMS), Trusted Research Environments (TRE), Secure Data Environments (SDE), Data Safe Havens (DSH), the Five Safes model, healthcare data processing, NHS Data Security and Protection Toolkit, anonymising personal data, data protection, and ethics. More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Bechtel Oil, Gas & Chemicals Incorporated
and our relentless drive to deliver the most successful outcomes, we align our capabilities to our customers' objectives to create a lasting positive impact. We serve the Infrastructure; Nuclear, Security & Environmental; Energy; Mining & Metals, and the Manufacturing and Technology markets. Our services span from initial planning and investment, through start-up and operations. This position is for an Information … Configuration Manager who will work a multi-year United Kingdom (UK) nuclear infrastructure for which Bechtel are the Technical Partner (covering Project Management and Engineering services). This programme involves a multi-billion investment in nuclear and non-nuclear facilities. Job Summary: The Information & Configuration Manager will be responsible for managing the project information, data & configuration management requirements. … The individual will consider Client requirements and Contractual agreements and will ensure that systems for data lifecycle management are implemented on the project. The individual will work to ensure that the project's information & data management is delivered in compliance with the requirement's identified within the Client's processes and procedures. The Information & Configuration Manager will work More ❯
Brentford, Middlesex, United Kingdom Hybrid / WFH Options
Bechtel Oil, Gas & Chemicals Incorporated
and our relentless drive to deliver the most successful outcomes, we align our capabilities to our customers' objectives to create a lasting positive impact. We serve the Infrastructure; Nuclear, Security & Environmental; Energy; Mining & Metals, and the Manufacturing and Technology markets. Our services span from initial planning and investment, through start-up and operations. This position is for an Information … Configuration Manager who will work a multi-year United Kingdom (UK) nuclear infrastructure for which Bechtel are the Technical Partner (covering Project Management and Engineering services). This programme involves a multi-billion investment in nuclear and non-nuclear facilities. Job Summary: The Information & Configuration Manager will be responsible for managing the project information, data & configuration management requirements. … The individual will consider Client requirements and Contractual agreements and will ensure that systems for data lifecycle management are implemented on the project. The individual will work to ensure that the project's information & data management is delivered in compliance with the requirement's identified within the Client's processes and procedures. The Information & Configuration Manager will work More ❯
Work Location: NIWC PAC, Point Loma, CA Work Schedule: Full-time, onsite Security Clearance: Secret Requisition: ISSM2-001-SD Job Summary: The Information System Security Manager II will support the Naval Information Warfare Center Pacific (NIWC PAC) and provide In-Service-Engineering-Activity (ISEA) functions for tactical data links and related systems sponsored by PEO-C4I. The support … will include the following areas of expertise: Technical Assistance, Fleet In-Service Engineering Support, Maintenance Support, In-Service Risk Management, Integrated Logistics Support, Technical Oversight of commercial/non-governmental In-Service engineering activities, Configuration Management, Readiness and Life Cycle Analysis, Technical Documentation Development and Reliability/Availability and Maintainability (RAM) reporting and metrics. Responsibilities: Oversee and manage … information security program implementation within the organization or other area of responsibility. Manage strategy, personnel, infrastructure, policy enforcement, emergency planning, security awareness, and/or other resources. Acquire and manage the necessary resources, including leadership support, financial resources, and key security personnel, to support information technology (IT) security goals, and reduce overall organizational risk. Requirements: Must More ❯
Work Location: NIWC PAC, Point Loma, CA Work Schedule: Full-time, onsite Security Clearance: Secret Requisition: ISSM1-001-SD Job Summary: The Information System Security Manager I will support the Naval Information Warfare Center Pacific (NIWC PAC) and provide In-Service-Engineering-Activity (ISEA) functions for tactical data links and related systems sponsored by PEO-C4I. The support … will include the following areas of expertise: Technical Assistance, Fleet In-Service Engineering Support, Maintenance Support, In-Service Risk Management, Integrated Logistics Support, Technical Oversight of commercial/non-governmental In-Service engineering activities, Configuration Management, Readiness and Life Cycle Analysis, Technical Documentation Development and Reliability/Availability and Maintainability (RAM) reporting and metrics. Responsibilities: Oversee and manage … information security program implementation within the organization or other area of responsibility. Manage strategy, personnel, infrastructure, policy enforcement, emergency planning, security awareness, and/or other resources. Acquire and manage the necessary resources, including leadership support, financial resources, and key security personnel, to support information technology (IT) security goals, and reduce overall organizational risk. Requirements: Must More ❯
Information System Security Manager Clearance: TS/SCI with Polygraph Reston, VA Supporting the Most Exciting and Meaningful Missions in the World Cyber and Information Security Specialist (INFOSEC) perform functions in support of the directorate's Information System Security Manager (ISSM) and deliver outcomes as follows: Review and analyze systems architecture diagrams and networks. Support Assessment and … and apply ICD 503, NISPOM, and other federal guidelines in support of systems used at contractor facilities. Assist program systems owners and/or service providers throughout the risk management framework (RMF), including the assessment and authorization (A&A) processes, as follows: Provide advice to program system owners and/or service providers on the creation of required system … documentation or body of evidence; review and provide recommendation for approval or disapproval, as appropriate. Assess security and privacy controls and data protection in sponsor information systems and environments of operation as part of the initial security assessment and during operational changes affecting information systems' security posture. Assist the security control accessors (SCA), as appropriate, in More ❯
Evolver is seeking a Network Security Engineer to support Information Assurance (IA), Cyber Security, and Computer Network Defense functions. The ideal candidate will be responsible for securitymanagement, policy enforcement, certification and accreditation (C&A) processes, and ensuring compliance with federal laws, DoD, DON, and ONRG regulations. This position requires on-site work at Arlington, VA. … The Network Security Engineer will work closely with security teams, system administrators, and leadership to monitor, detect, and respond to cybersecurity incidents, ensuring robust network defense strategies. Responsibilities Develop, maintain, and enforce security policies and procedures to align with DoD and federal compliance requirements. Submit and manage Certification and Accreditation (C&A) packages for system approvals. Monitor … detect, and respond to cybersecurity incidents, providing risk assessments and security analysis. Provide security awareness training and network security situational reports to leadership. Manage the SAAR-N (System Authorization Access Request - Navy) process, ensuring timely approval and documentation. Conduct eMASS security control assessments and POAM documentation to support system authorizations. Run CMRS reports, analyze vulnerability data More ❯
Physical Security Operations, Program Manager Location: Client Site - Reston, VA or Redmond, WA Travel: Up to 10% Clearance Required: Active TS/SCI with Polygraph About the Opportunity: Be the driving force behind program growth and excellence-leading performance, ensuring compliance, and enhancing service delivery. If you thrive in high-stakes environments and excel at leading diverse, geographically dispersed … teams, this is your chance to make a meaningful impact. Were looking for a strategic, results-oriented, growth focused leader with deep expertise in physical security operations, workforce management, and stakeholder engagement-ready to support a global leader in the Software and IT industry. This is a unique opportunity to make a high-impact contribution within a complex … matrixed organization at the forefront of innovation. What You'll Do: • Design, implement, and continuously improve operational strategies to ensure seamless security coverage, rapid incident response, and compliance with stringent standards. • Deliver executive-level briefings and updates to clients-presenting program performance metrics, risk assessments, and strategic recommendations. • Oversee program financials-developing and managing the budget, forecasting costs, and More ❯
Position Summary Odyssey Systems has an exciting new opportunity for a Journeyman Acquisition Security Manager supporting the Air Force Life Cycle Management Center's Intelligence Directorate, located at Wright Patterson AFB, OH. Responsibilities Duties include, but not limited to: Lead and implement program securitymanagement in collaboration with government personnel, prime contractors, and subcontractors. Develop, update … and maintain security documentation including classification guides, Program Protection Plans (PPP), OPSEC plans, security CONOPS, and related materials. Review and evaluate contractor deliverables (software/hardware) and acquisition documentation for compliance with security policies and regulations. Plan and conduct security-related surveys, studies, risk analyses, and assessments throughout the program life cycle. Administer and monitor databases … for classified material, visits, clearances, and audits; ensure accountability and secure handling. Establish and maintain physical, personnel, documentation, and COMSEC security protocols for secure environments. Provide security education, awareness training, and support to source selection activities and Special Access Programs (SAP). Demonstrated knowledge and hands-on experience in acquisition program security across defense systems. Familiarity with More ❯
Position Summary Odyssey Systems has an exciting new opportunity for a Senior Acquisition Security Manager supporting the Air Force Life Cycle Management Center's Integrated Development Office, located at Wright Patterson AFB, OH. Responsibilities Duties include, but not limited to: Lead and implement program securitymanagement in collaboration with government personnel, prime contractors, and subcontractors. Develop … update, and maintain security documentation including classification guides, Program Protection Plans (PPP), OPSEC plans, security CONOPS, and related materials. Review and evaluate contractor deliverables (software/hardware) and acquisition documentation for compliance with security policies and regulations. Plan and conduct security-related surveys, studies, risk analyses, and assessments throughout the program life cycle. Administer and monitor … databases for classified material, visits, clearances, and audits; ensure accountability and secure handling. Establish and maintain physical, personnel, documentation, and COMSEC security protocols for secure environments. Provide security education, awareness training, and support to source selection activities and Special Access Programs (SAP). Demonstrated knowledge and hands-on experience in acquisition program security across defense systems. Familiarity More ❯
Contractor Program Security Officer (CPSO) Job Category: Security Time Type: Full time Minimum Clearance Required to Start: TS/SCI Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Local This position serves as Contractor Program Security Officer (CPSO) responsible for instituting all customer related security requirements as it relates to the … contracts being carried out in the Sensitive Compartmented Facility, to include daily securitymanagement oversight for multiple programs with overall responsibility for physical security, communications security, information security, operational security and security education as they apply to these programs, facilities and supporting personnel. In addition, this position may also be responsible for all … COMSEC activities. Must have current experience in the U.S. Government, DoD, Intelligence, or contractor community in security management. Essential Responsibilities: Conduct Annual Self-Inspection using the customer specific Integrated Security Assessment Checklist and other Agencies specific Checklist. Preparation, Development and Maintenance of OPSEC, SOP, Protection plans, DD254 and other required security documentation. Prepares and implement securityMore ❯
Personnel Security Analyst, AWS Security Job ID: Amazon Web Services Australia Pty Ltd Amazon Web Services (AWS) is the leading cloud service provider, providing virtualised infrastructure, storage, networking, messaging, and many other services to customers all over the world. AWS runs a globally distributed environment, operating at massive levels of scale. Businesses, from start-ups to enterprises to … large government customers, run their operations and applications on AWS' highly secure infrastructure. The AWS Personnel Security (PerSec) team is responsible managing security clearance and vetting activities for AWS employees supporting programs, including continual assessments on suitability. As a Personnel Security Analyst, you will join a team of industry-leading security experts working with customer representatives … to operate and continuously improve industry-leading personnel security programs and processes. The AWS Security team requires innovative thinking that is balanced with a strong customer focus on quality and execution. You will have a strong track record of leading and supporting security programs, demonstrable program/project management experience, comprehensive knowledge of government clearance (e.g. More ❯
always in mind, our employees deliver end-to-end technology solutions connecting the space, air, land, sea and cyber domains in the interest of national security. Job Title: Information Security Systems Engineer Job Code: 24133 Job Location: Huntsville, AL Job Schedule: 9/80 Job Description: Applies current systems security engineering methods, practices and technologies to the architecture … design, development, evaluation and integration of systems and networks to maintain system security. Works closely with Government customers to ensure that the security protection needs, concerns and requirements are defined and implemented with appropriate fidelity and rigor, early and in a sustainable manner throughout the life cycle of system that will allow for the security authorization of the … or commercial product vendors in the design and evaluation of state-of-the-art secure systems, networks, and database products. Uses methods such as encryption technology, vulnerability analysis and security management. Responsible for integration of multiple methods into a cohesive system security perimeter and environment and the policies and procedures necessary to monitor and maintain such an environment. More ❯